{"id":6115,"date":"2015-10-29T00:00:00","date_gmt":"2015-10-28T23:00:00","guid":{"rendered":"http:\/\/e3mag.com\/?p=6115"},"modified":"2019-04-01T10:35:58","modified_gmt":"2019-04-01T08:35:58","slug":"a-gift-horse","status":"publish","type":"post","link":"https:\/\/e3mag.com\/en\/einem-geschenkten-gaul\/","title":{"rendered":"A gift horse ..."},"content":{"rendered":"<p>While commercial and paid-for software used to be the rule, today you can find more and more free offers. However, there is no such thing as \"free\" or \"gratis\" in the free economy.<\/p>\n<p>In English, there is also an apt description for this: \"TANSTAAFL - there ain't no such thing as a free lunch\".<\/p><div id=\"great-3235053788\" class=\"great-fullsize-content-en great-entity-placement\" style=\"margin-bottom: 20px;\"><a data-no-instant=\"1\" href=\"https:\/\/www.youtube.com\/watch?v=6Ja0zaCg0ss\" rel=\"noopener\" class=\"a2t-link\" target=\"_blank\" aria-label=\"banner_bdc_2026_1200x150\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_bdc_2026_1200x150.jpg\" alt=\"\"  srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_bdc_2026_1200x150.jpg 1200w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_bdc_2026_1200x150-400x50.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_bdc_2026_1200x150-768x96.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_bdc_2026_1200x150-100x13.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_bdc_2026_1200x150-480x60.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_bdc_2026_1200x150-640x80.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_bdc_2026_1200x150-720x90.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_bdc_2026_1200x150-960x120.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_bdc_2026_1200x150-1168x146.jpg 1168w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_bdc_2026_1200x150-18x2.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_bdc_2026_1200x150-600x75.jpg 600w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"1200\" height=\"150\"  style=\" max-width: 100%; height: auto;\" \/><\/a><\/div>\n<p>There may be no payment, but you still have to pay with something of value. In most cases today, users simply pay for free internet offers or apps with their data.<\/p>\n<p>A user becomes a \"profile\" - and the more you enrich it with data, the better you can tailor advertising to that user. This \"business model\" is omnipresent today, even with some security products.<\/p>\n<p>However, with this model, the data usually remains in the relationship between provider and customer. This is something that the customer can normally still penetrate. However, it becomes critical when (even anonymized) profiles are sold on to third parties.<\/p>\n<p>This \"Holy Grail\" for advertisers makes it possible to create even better and more transparent profiles by cross-correlating a wide variety of data sources.<\/p>\n<p>And this is all the more true if it is possible to \"de-anonymize\" data that is actually anonymous in this way.<\/p>\n<p>This is all the more tragic because both theoretical and practical experiments clearly show that de-anonymization is basically a purely statistical problem that depends solely on the available data sources and quantities.<\/p>\n<h3>Galloped<\/h3>\n<p>Unfortunately, even providers of security solutions are now using this opportunity to earn extra money. This is all the more tragic as a certain level of sensitivity is expected when handling personal data, especially in the security sector.<\/p>\n<p>Although legally perfectly legal, the question of ethics must also be allowed here. Of course, the resale of data is a lucrative additional business for the provider. However, customers can no longer penetrate this \"three-or-more\" relationship.<\/p>\n<p>The simple question \"Who has my data?\" is almost impossible to answer.<\/p>\n<p>Until now, the only option was to stubbornly work through the provider's terms and conditions. The fact that these are usually written in the finest legal English did not exactly make the task any easier ...<\/p>\n<h3>Backing the right horse<\/h3>\n<p>This is where the so-called \"minimum standard\" of the European Expert Group for IT Security (EICAR) comes into play. It is probably known to many as an independent European research organization in the antivirus sector, but has long been concerned with IT security as a whole.<\/p>\n<p>The most recent project is the \"minimum standard\", which forces certified providers to maintain data hygiene. This means that security products may only collect and transfer data to the manufacturer that is absolutely necessary to fulfill the security functions.<\/p>\n<p>The collection and transfer of personal data clearly violates this requirement. As CTO of Trend Micro, it is also a personal concern of mine to say that we were the first manufacturer to certify solutions according to the EICAR minimum standard.<\/p>\n<p>Trend Micro's business model is to sell our customers the best possible protection against the dangers of the IT world. The collection and secondary use of customer data and its resale are definitely not part of this.<\/p>\n<p>Ultimately, you have to ask yourself which horse you want to back, what price you are prepared to pay for a service or solution.<\/p>\n<p>On the one hand, there is the commercial option with a clearly defined monetary price and corresponding performance. On the other hand, you pay with your data ...<\/p>","protected":false},"excerpt":{"rendered":"<p>Free of charge! Free! Free! There are many terms for labeling software. What at first glance means the same thing, is at best the same thing at second glance. This small but subtle difference must also be taken into account on the Internet.<\/p>","protected":false},"author":38,"featured_media":14340,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[1583],"tags":[10343],"coauthors":[19920],"class_list":["post-6115","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-1583","tag-trend-micro","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2015\/12\/2015.jpg",1000,387,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2015\/12\/2015-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2015\/12\/2015.jpg",400,155,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2015\/12\/2015-768x297.jpg",768,297,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2015\/12\/2015.jpg",1000,387,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2015\/12\/2015-100x39.jpg",100,39,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2015\/12\/2015-480x186.jpg",480,186,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2015\/12\/2015-640x248.jpg",640,248,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2015\/12\/2015-720x279.jpg",720,279,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2015\/12\/2015-960x372.jpg",960,372,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2015\/12\/2015.jpg",1000,387,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2015\/12\/2015.jpg",1000,387,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2015\/12\/2015.jpg",1000,387,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2015\/12\/2015.jpg",1000,387,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2015\/12\/2015.jpg",1000,387,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2015\/12\/2015.jpg",18,7,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2015\/12\/2015.jpg",1000,387,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2015\/12\/2015.jpg",1000,387,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2015\/12\/2015.jpg",1000,387,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2015\/12\/2015.jpg",600,232,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2015\/12\/2015.jpg",600,232,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2015\/12\/2015-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2015\/12\/2015-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2015\/12\/2015-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2015\/12\/2015-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2015\/12\/2015-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Kostenlos! Gratis! Frei! Zur Kennzeichnung von Software gibt es viele Begriffe. Was auf den ersten Blick dasselbe meint, ist auf den zweiten Blick aber h\u00f6chstens das Gleiche. Diesen kleinen, aber feinen Unterschied gilt es auch im Internet zu beachten.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/en\/category\/1511\/\" rel=\"category tag\">MAG 15-11<\/a>","author_info_v2":{"name":"E-3 Magazine","url":"https:\/\/e3mag.com\/en\/author\/e-3-magazin\/"},"comments_num_v2":"0 comments","_links":{"self":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/6115","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/comments?post=6115"}],"version-history":[{"count":0,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/6115\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media\/14340"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media?parent=6115"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/categories?post=6115"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/tags?post=6115"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/coauthors?post=6115"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}